A State of the Art Security Taxonomy of Internet Security: Threats and Countermeasures

Size: px
Start display at page:

Download "A State of the Art Security Taxonomy of Internet Security: Threats and Countermeasures"

Transcription

1 GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 27 A State of the Art Security Taxonomy of Internet Security: Threats and Countermeasures Ali Abbas 1, Abdulmotaleb El Saddik 1,2, and Ali Miri 2 1 Multimedia communications Research Laboratory 2 School of Information Technology and Engineering (SITE) University of Ottawa 800 King Edward, P.O. Box 450, Stn A, Ottawa, Ontario, Canada, K1N 6N5 Tel: (613) x 6277, Fax: (613) samiri@site.uottawa.ca {abed, abbas}@mcrlab.uottawa.ca Abstract. The main objectives of the different security services and mechanisms today are to provide privacy of information to ensure that the tools used to establish a proper environment to the user are reliable and trusted. With the dramatic increase of the use of the Internet and its applications that require high level of security services, such as e-commerce transactions and on-line banking, it is quiet useful to formulate a systematic approach to analyze the security services, and countermeasures which are directly associated with each security attack. Taxonomy is one of the keys to understand the security threats that the Internet is facing today and the countermeasure approaches that should be devised in order to keep the Internet as secure as possible. In this paper, we propose a novel Internet security taxonomy. This taxonomy is based on a mapping of today s Internet security services against the corresponding security attacks and countermeasures. An assessment of the performance of the proposed taxonomy is also discussed. 1 Introduction Today, the Internet has become the fastest growing part of the global network. However, it is the network part that draws more attention to the security related issues because of its possible design flaws and vulnerability to attacks. A successful attack on a system on the Internet can pose a major threat because it can influence the system performance and the services used by millions of users. The Internet security flaws and vulnerabilities as well as the wide range of techniques used to implement and utilize different Internet applications emphasize the complexity of connecting all those related issues together and mapping them through classification categories to produce taxonomies. Internet security countermeasures which are going to provide the essential tools to develop security defenses and improve the overall security outcomes, require a deep understanding of the methods employed by security attacks.

2 28 A State of the Art Security Taxonomy of Internet Security This paper can be seen as an attempt to provide a state of the art, yet practical approach to formalize classification categories that map the security attacks to the security services associated with the attacks and well defined countermeasures. In Section 2, we provide an overview of some related work in security taxonomies. Section 3 describes our newly proposed internet security taxonomy. Section 4 discusses the performance assessments of the proposed taxonomy. Finally, we conclude the paper in Section 5 by giving some insight into future work. 2 Related Work In this section, we discuss several research works that classify the vulnerability of the security systems allowing us to identify different type of taxonomies. It is worth mentioning that the simplest form of taxonomies can be seen as a single list of terms. Such a simple taxonomy only lists a long range of terms without classifying the attacks or the countermeasures. Existing work can be classified by the type of taxonomy used. Among the empirical approaches to classify security attacks and counter measures is the work presented by Neumann and Parker [4]. They designed a list of categories called the Empirical List Taxonomy. The categories of the empirical list taxonomy has some drawbacks, for example, the abuse through inaction category, in most cases, can not be considered as an attack since a careless administrator may cause a problem not only in security but also in most of the system s aspects and utilization. Furthermore, bad administration is not an attempt to gain unauthorized use or unauthorized access into the system, which means that this approach does not clearly distinguish between a security threat and any other type of malfunctions. Beside that the empirical list has an overlap between its classes, for example; masquerading may use a technique to defeat authentication or authorization service which may cause an overlap between two different categories. Process-based taxonomies are the second type of possible classification. One of the main approaches in defining process-based security taxonomy is the one proposed by Stallings [10]. Stallings s approach concentrated on the security threats during the transmission of data over the Internet, which can be considered as only a subset of the Internet security. This taxonomy presents a very broad framework with an unspecific and very general classification that might be considered enough for assessing the rational of the attacks. [1] present software security faults taxonomy that come from specification, design, and/or implementation can cause security flaws, but it is a software development issue and it has to be discussed and considered within those boundaries. More specifically, software development considerations have to fall outside the classification of the security threats, unless they are imposed on the system from the outside when attackers exploit the vulnerability embedded within the software. Our taxonomy presented in the next section, will consider these issues and differentiate between software bugs and malicious programs such as viruses, time bombs, etc. Another central works in classifying the security attacks was done by Perry [13]. The idea behind their two-dimension matrix taxonomy is to widen the scope of the classi-

3 GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 29 fication and to form a map that matches potential attackers to potential damages. Such a map is by nature not logical, because it may difficult to associate potential attacks to specific damages. In fact this is one of the limitations of this taxonomy, because creating such a map assumes a restriction of specific kind of damage to a specific kind of attackers and vice versa. For example, it is not logical to restrict the physical destruction only to the operator, or restrict the information destruction to the operators and programmers. Generally, Perry s matrix represents an improvement over the one dimension taxonomy approaches discussed earlier because it comprises twodimensions with respect to security attacks and damages, but still, the cells of this matrix cannot cover the whole area of security attacks. The three-dimension matrix taxonomy presented by Landwehr [2] specifies three phases in the system life cycle where security flaws may be introduced; the development phase, the maintenance phase, and the operation phase. The development phase includes all the systematic processes from the specification up to the deployment of the system. The maintenance phase includes all the activities that can provide a mean to adjust, modify and improve the performance of the system after the initial operation. Finally, the operation phase includes the adaptation and insertion of any kind of flaws during the operation time of the system. There is obviously an overlap between the maintenance and the operational phase, but still they are distinct enough to fulfill the requirements and serve the cause of the taxonomy, that is, to be specific and provide a method to countermeasure the flaws. Howard [12] work divides the attack into six steps that attackers should follow in order to be successful. This taxonomy differentiates between the result of an attack and the objective of the attacker. In addition to that, Howard s taxonomy summarized the vulnerability in three components where the attacker can gain some advantages: design, implementation, and configuration. Classifying the vulnerability in this way may sometimes be not practical, especially if we consider different attacks techniques that are not concerned with the design, implementation and/or configuration, such as social engineering attacks. In the next section, we will present our newly designed security taxonomy; this will include the new classification categories of the security attacks, the matrix that map the associated security services to the attacks, and the approach used to drive the third dimension or the countermeasures to the attacks in our matrix. 3 Proposed Internet Security Classification Based on the above discussion of existing approach we feel the need for a taxonomy which follows a less general and more specific process of categorization of the classes of the security attacks. It is important to address software flaw as one possible category but we make a clear distinction between software flaws, bugs, and viruses, just to name a few. We, therefore, specify the functionality and performance of the security services with respect to the attacks and illustrate how the security countermeasures may improve the security services in any particular area. The proposed classification consists of a list of categories, which represent the actual and potential security attacks that may target the system. The objectives and the affected areas of

4 30 A State of the Art Security Taxonomy of Internet Security the Internet security attacks are also identified, and countermeasures are introduced. The elements of the proposed list of Internet attack s categories are: Manual Penetrating the System and/or Individual Privacy: This category includes all methods and techniques facilitating the manual penetrating to a system such as password cracking, social engineering, and masquerading. Data Interception, Interruption, and Replaying: This class contains among others interception of information and/or a sequence of communication process, tampering, modifying and message deleting of data while it is in transmission. and Physical Token: It includes all attacks using physical or biometrical methods and processes such as forged fingerprint or replicating the biometrics signature. Defeating Mechanisms and Policy: The member of this class includes all the challenges related to the authentication, authorization, and access control mechanisms and policies; Malicious Code: This category comprises among others malicious software, viruses, malfeasant code, bugs, coding problem; Distributed Communication Systems: This class contains all different types of Distributed Denial of Service (DDoS), and other attacks using network communication protocol as means such as the TCP/IP. 4 New Matrix for a State of the Art Internet Security Taxonomy Internet security comprises the operations that protect the information and the system that is processing the information by providing some basic security services like availability, integrity, authentication, confidentiality, and non-repudiation. These services may include the prevention mechanisms against any attacks or potential security attacks. Taxonomy for security services must provide a comprehensive review of the security services and attacks in such a way that system designers will benefit in anticipating their systems flaws and vulnerabilities. Based on a given taxonomy, the d esigner can follow all the records under any specific classified group of attacks and services to analyze the weakness and vulnerabilities to become more knowledgeable, vigilant, and confident in building a better and more secure environment. More specifically, and in order to be used the Internet security service taxonomy has to be detailed, comprehensive, and practical. The work presented in this paper is an effort in producing a comprehensive taxonomy, which can address some of the flaws and shortcomings of the previous work in the literature. As our taxonomy tries to map the existing security attacks to that of security services; we will use the list of security services proposed by [7] as one of the axes of our two-dimensional taxonomy. NSIT security services categories include: confidentiality; Data Integrity; Authentication; Authorization and Internet Access Control; Non-repudiation; and Availability. To produce a taxonomy requires understanding of the security mechanisms, including both the services and the attacks, and on how all of their components work.

5 GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 31 In addition to that, one needs an understanding of how the security components are interconnected and interrelated to each other. In other words, there is a need to decompose the security system into subsystems, and try to analyze their entities, attributes of those entities, the interrelationship among them and the performance of those subsystems. Security performance of a system comes as a result of the performance of its subsystems and components. Vulnerabilities in any of the security components might be exploited by the attacker to launch his unauthorized access or use of the system. The first step toward developing our taxonomy was to build new classification categories for Internet security attacks, as presented in the previous section. In the following, we will introduce a new matrix taxonomy of security services which relates these services to the appropriate Internet security attacks. We will also analyze each security attack, assess its impact, and link it to one or more security possible countermeasures. Table 1 shows two dimensions of our suggested new internet security services taxonomy. One of the dimensions represents the security services. The other dimension represents the above discussed classification categories of the security attacks. The elements in the cell represent the security attack and their appropriate security counter measure. The first cell, in the first column of the matrix, that maps confidentiality to the Manual Penetrating the System and/or Individual Privacy class (MPSIP) of attacks comprise for instance Social Engineering as security attack and Privacy and Unpredictable as countermeasure. The C-DIIR cell comprises Eavesdrops as security attacks and Repeated Challenge Response as countermeasure. The C-BPT cell might have Interception as security attack and Data Encryption as countermeasure. The C-DAMP cell comprises Extract PIN as security attack and PIN Incorporated into Base Secret as a countermeasure. The C-MP cell comprises Back Door as an attack and Eliminate Back Door as countermeasure. And the last cell in this column, C-DCP, comprises Direct Communication as attack and Observing and Restrict Connection to the System as countermeasure. The second column in the matrix presents a Data Integrity as security service in conjunction with the Nature of Attacks. The DI-MPSIP cell comprises s File Theft as security attack and Hashed s File as countermeasure. The DI-DIIR cell comprises Modifying Intercepted Message as an attack and Encryption System as countermeasure. The DI-BPT comprises Forged as security attack and Encoded s as countermeasure. The DI-DAMP cell comprises Attacking Encryption Procedures as security threat and Reliable Encryption procedure as countermeasure. The DI-MP cell comprises Trojan horse as security attack and Firewall as countermeasure. Finally the DI-DCP cell comprises Source Address Forgery as security attack and TCP Synchronization as countermeasure.

6 32 A State of the Art Security Taxonomy of Internet Security Table 1. Matrix of the Internet Security Framework. The table shows security services in the x- axis, class of the security attacks in the y-axis and possible security attacks with their corresponding security counter measure (SA/SCM) in the main cells of the table. Confidentiality Data Integrity Authentication Authorization & Internet Access Control Non-Repudiation Availability Manual Penetrating the System or the Individuals Privacy Data Interception, Interruption and Replaying and Physical Token Defeating Authentication Mechanisms and Policies Social Engineering/ Privacy and Unpredictable Eavesdrops/ Repeated Challenge Response Extract PIN/ PIN Incorporated into Base Secret s File Theft/ Hashed s File Modifying Intercepted Message/ Encryption System Forged / Encoded s Attacking Encryption Procedures/ Suitable Encryption Procedures On-line Guessing/ Audit Bad s Sniffing/ Encrypted Interception/ Data Encryption Replicating the Signature/ Authenticate Signature/ Public Key Forgeries/ Public Key Certificate Account Theft/ Enrolment in Person Sniffing a Private Key/ Public Key on Smart Card Off-line Search/ Forced Lengthy Trails Reply Hashed / Onetime Defeating matching mechanisms / Minimizing matching score. Forge Authorization Privilege/ Encrypted Access Connection Sensor Disorientation/ Check and Maintain Sensor Convert Reject into Accept/ Keyed Hash Incorporating OS Substitution/ BIOS Unauthorized Delete of Data/ Limited Access Steal the Token/ Backup Emergency Processes Synchronization Flood/ Connection Management

7 GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 33 Malicious Program Time Bomb/ Firewall and or Antivirus Distributed and Communication Protocols Back Door/ Eliminate Back Door Direct Communication Attack/ Observing and Restrict Connection to the System Trojan Horse/ Firewall Source Address Forgery/ TCP Synchronization Trojan Login/ Change s IP Address Theft/ GPS Location Authentication Mutual Trust/ Firewalls and Enforce Access Control IP Spoofing/ Unpredictable TCP Sequencing IP Hijacking/ Integrity of the Host OS Buffer Overrun/ Server Encapsulation Distributed Denial of Service/ Observing the System Performance The third column in matrix maps authentication to the classes of the security attacks. The AUT-MPSIP cell comprises On-line Guessing as security attack and Audit Bad s as countermeasure. The AUT-DIIR cell covers for example sniffing as an attack and Encrypted as countermeasure. The AUT-BPT comprises Replicating the Signature as security attack and Authenticate Signature as countermeasure. The AUT-DAMP cell comprises Public Key Forgeries as security threat and Public Key Certificate as countermeasure. The AUT-MP cell comprises Trojan Login as security attack and Change s as countermeasure. Finally the AUT-DCP cell comprises IP Address Theft as security attack and GPS Location Authentication as countermeasure. The fourth column in matrix maps authorization and internet access control to the classes of the security attacks. The AIAC-MPSIP cell comprises Off-line Search as security attack and Forced Lengthy Trails as countermeasure. The AIAC- DIIR cell covers for example Reply Hashed as an attack and One-time as countermeasure. The AIAC-BPT comprises Defeating matching mechanisms as security attack and Minimizing matching score as countermeasure. The AIAC-DAMP cell comprises Forge Authorization Privilege as security threat and Encrypted Access Connection as countermeasure. The AIAC-MP cell comprises Mutual Trust as security attack and Enforce Access Control as countermeasure. Finally the AIAC-DCP cell comprises IP Spoofing as security attack and Unpredictable TCP Sequencing as countermeasure. The fifth column in matrix maps Non-repudiation as a security service to the classes of the security attacks. The NR-MPSIP cell comprises Account Theft/ as security attack and Enrolment in Person as countermeasure. The NR-DIIR cell covers for example, sniffing a Private Key as an attack and Public Key on Smart Card as countermeasure. The NR-BPT comprises Sensor Disorientation as security attack and Check and Maintain Sensor as countermeasure. The NR- DAMP cell comprises Convert Reject into Accept as security threat and Keyed Hash Incorporating as countermeasure. The NR-MP cell comprises Buffer Overrun as secu-

8 34 A State of the Art Security Taxonomy of Internet Security rity attack and Server Encapsulation as countermeasure. Finally the NR-DCP cell comprises IP Hijacking as security attack and Integrity of the Host OS as countermeasure. The sixth column in matrix maps availability as security service to the classes of the security attacks. The AV-MPSIP cell comprises OS Substitution as security attack and BIOS as countermeasure. The AV-DIIR cell covers for example Unauthorized Delete of Data as an attack and Limited Access as countermeasure. The AV- BPT comprises Steal the Token as security attack and Backup Emergency Processes as countermeasure. The AV-DAMP cell comprises Synchronization Flood as security threat and Connection Management as countermeasure. The AV-MP cell comprises Time Bomb as security attack and Anti-virus as countermeasure. Finally the AV-DCP cell comprises Distributed Denial of Service as security attack and observing the System Performance as countermeasure. 5 Conclusion and Future Work The proposed taxonomy identifies different countermeasures based on the objective of the attack. For example, if the attacker succeeds to exploit communication protocol vulnerabilities such as IP address theft, then he may tamper with availability, data integrity, or any other security service. At this level of attack, all the necessary prevention countermeasures must be taken in order to stop the attacker from achieving his possible goals. To protect confidentiality, the private files and information have to be encrypted, so the attacker will fail to have a plain text of what he/she is looking for. This protection process may guard any sensitive data or information against theft, but still, there is possibility that this information will be corrupted. Therefore, to protect the integrity, we need to continuously backup such information. This extent and link connection between the attacks and the countermeasures will give the researchers a powerful tool to conduct a focused and targeted kind of research. To illustrate this further, consider the example of the cell C-PSI, which depicts the case when the confidentiality as a security service is violated by penetrating the system or the individual s privacy class of attacks. The recommendation through this taxonomy to the user or system administrator is to use the properly established authentication methods to eliminate or to reduce the risk of this attack. Under such attacks, a system can be monitored very carefully to detect any presence or attempt to retrieve the original text from the system, or any other unauthorized files transmission or malicious software. Moreover, user commands can be logged, and the resulting log is used to identify any attack on the system, and then to investigate the system s performance during and after the attack. Every cell in the matrix (table 1) has the potential to be expanded for further research and investigation, by being used to articulate an organized and detailed record of actual and potential threats with well-defined countermeasures. Every cell can be used to map the associated security attacks to the security services designed to combat that attack. Hence, given a general goal of identifying the attacks and their class of category, researchers can use the concept and approach of our taxonomy, and utilize it to build a stronger security system.

9 GESTS Int l Trans. Computer Science and Engr., Vol.19, No.1 35 Definitely, the research on the Internet security systems has to be expanded and formulated in more systematic approach. Internet technologies are moving very fast; as a result, new attacks and countermeasures are continuously introduced. There is always a need to update or introduce new classification categories of the Internet security attacks. In addition to that, future work may include further validation and verification of the taxonomy that we presented in this research. Such verification may be achieved by analyzing the performance of the taxonomy using newly introduced attacks and countermeasures, for example, researchers may apply new attacks which are developed based on a new emerging internet technology to our classification and identity where do they fit within our taxonomy. Another optimization of our taxonomy can be using cost functions as another dimension of the taxonomy. References [1] T. Aslam, I. Krsul, and E. Spafford, Use of A Taxonomy of Security Faults, Proceedings of the 19th National Information Security Conference, [2] C. Landwehr, A. Bull, John P. McDermott, and W. Choi, "A Taxonomy of Computer Security Flaws," ACM Computing Surveys, Vol. 26, No. 3, September 1994, Page(s): [3] J. Howard, T. Longstaff, A common language for computer security incidents, Sandia National Laboratories Albuquerque Report, Report No. SAND , New Mexico, [4] P. Neumann and D. Parker, A Summary of Computer Misuse Techniques, Proceedings of the 12th National Computer Security Conference, 1989, Page(s): [5] C. Irvine, T. Levin, Toward a Taxonomy and Costing Method for Security Services, Proceedings of Computer Security Applications Conference, [6] C. Irvine, T. Levin, February 2001 Quality of Security Services, ACM Proceedings of the 2000 workshop on New security paradigms, ISBN: , Page(s): [7] National Institute of Standards and Technology (NIST), Underlying Technical Models for Information, Technology Security, Special Publication No , December Also available at [8] Open Source Security Testing Methodology Manual Pitfalls (OSSTMM), Version 2.5, August 2003, available at [9] Common Criteria (CC) project report, Common Criteria for Information Technology Security Evaluation, August 1999, available at [10] W. Stallings, Network and Internetwork Security Principles and Practice, Prentice Hall, Englewood Cliffs, NJ, [11] L. Cranor, Internet privacy, February 1999, Communications of the ACM, Volume 42, Issue 2, Page(s) [12] John D. Howard, An Analysis of Security Incidents on the Internet, Ph.D. Thesis, Carnegie Mellon University, Pittsburgh, USA, Also available at [13] T. Perry and P. Wallich, "Can Computer Crime Be Stopped?, IEEE Spectrum, Vol. 21, No. 5.

10 36 A State of the Art Security Taxonomy of Internet Security [14] James Essinger, Internet Trust and Security, Addison-Wesley, Great Briton 2001, Page(s): Biography Name: Ali Abbas Address: 770 King Edward, CBY, B203A, Ottawa, ON, Education & Work experience: Ph.D. Candidate Biomedical Engineering, Ottawa University Tel: ext abbas@mcrlab.uottawa.ca Other information: Ali Abbas is a senior computer engineer, worked for different company such as CAE Electronics, Montreal, Nortel Networks, Ottawa, Mitel Networks, Kanata. He gained M.Sc. degree in Systems Science from Ottawa University, and he is a Ph.D. Candidate in Biomedical Engineering, Ottawa University. Name: Abdulmotaleb El Saddik Address: 800 King Edward, Ottawa, ON, Canada, K1N6N5 Education & Work experience: Associate Professor Tel: ext abed@mcrlab.uottawa.ca Other information: Dr. El Saddik is the director of the Multimedia Communications Research Laboratory (MCRLab). He has authored and co-authored two (2) books and more than 70 publications in the areas of software engineering development of multimedia artefacts and collaborative virtual environments. He is a Senior Member of IEEE and the recent winner of the prestigious Canadian Premier's Research Excellence Awards (PREA). Name: Ali Miri Address: 800 King Edward, Ottawa, ON, Canada, K1N6N5 Education & Work experience: Associate Professor Tel: ext samiri@site.uottawa.ca Other information: Dr. Miri is an Associate Professor at the School of Information Technology and Engineering, University of Ottawa, Canada. His research interests include security and privacy technologies and their applications in e- business and e-commerce, such as network security and the role of Public Key Cryptography.

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

Penetration Testing Service. By Comsec Information Security Consulting

Penetration Testing Service. By Comsec Information Security Consulting Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your

More information

NETWORK SECURITY ASPECTS & VULNERABILITIES

NETWORK SECURITY ASPECTS & VULNERABILITIES NETWORK SECURITY ASPECTS & VULNERABILITIES Luis Sousa Cardoso FIINA President Brdo pri Kranju, 19. in 20. maj 2003 1 Background Importance of Network Explosive growth of computers and network - To protect

More information

A Common Language for Computer Security Incidents

A Common Language for Computer Security Incidents SANDIA REPORT SAND98-8667 Unlimited Release Printed October 1998 A Common Language for Computer Security Incidents John D. Howard, Thomas A. Longstaff Prepared by Sandia National Laboratories Albuquerque,

More information

Weighted Total Mark. Weighted Exam Mark

Weighted Total Mark. Weighted Exam Mark CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

More information

Security aspects of e-tailing. Chapter 7

Security aspects of e-tailing. Chapter 7 Security aspects of e-tailing Chapter 7 1 Learning Objectives Understand the general concerns of customers concerning security Understand what e-tailers can do to address these concerns 2 Players in e-tailing

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements

More information

Taxonomic Modeling of Security Threats in Software Defined Networking

Taxonomic Modeling of Security Threats in Software Defined Networking Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

Chapter 6: Fundamental Cloud Security

Chapter 6: Fundamental Cloud Security Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

CS 392/681 - Computer Security. Module 16 Vulnerability Analysis

CS 392/681 - Computer Security. Module 16 Vulnerability Analysis CS 392/681 - Computer Security Module 16 Vulnerability Analysis Course Policies and Logistics Homework 5 due tonight Homework 6 posted Read Chapter 23 11/13/2003 Module 16 - Vulnerability Analysis 2 Some

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An

More information

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN Threat Modeling Frank Piessens (Frank.Piessens@cs.kuleuven.be ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Information Systems Security

Information Systems Security Information Systems Security Lecture 4: Security Engineering Prof. Dr. Christoph Karg Aalen University of Applied Sciences Department of Computer Science 11.10.2015 Learning Objective Learning Objective

More information

Security. Definitions

Security. Definitions Security While protection has been discussed throughout the class kernel vs. user mode, protected memory, file permissions these mechanisms have generally been focused on protection from accidental misuse

More information

Information Security Basic Concepts

Information Security Basic Concepts Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13 COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security

More information

Potential Targets - Field Devices

Potential Targets - Field Devices Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What

More information

Network Security. Introduction. Security services. Players. Conclusions. Distributed information Distributed processing Remote smart systems access

Network Security. Introduction. Security services. Players. Conclusions. Distributed information Distributed processing Remote smart systems access Roadmap Introduction Network services X.800 RFC 2828 Players Marco Carli Conclusions 2 Once.. now: Centralized information Centralized processing Remote terminal access Distributed information Distributed

More information

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

How To Protect A Database From Attack

How To Protect A Database From Attack Database Security in Assets of Companies Tianmin Qu Department of Computer Science Helsinki University of Technology tqu@cc.hut.fi The most sensitive data for commercial web sites will usually reside in

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Network Security: Introduction

Network Security: Introduction Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has

More information

Notes on Network Security - Introduction

Notes on Network Security - Introduction Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

Database security issues PETRA BILIĆ ALEXANDER SPARBER

Database security issues PETRA BILIĆ ALEXANDER SPARBER Database security issues PETRA BILIĆ ALEXANDER SPARBER Introduction Database security is one aspect of computer security It uses different information security controls to protect databases Information

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:

More information

Protection profile of an industrial firewall

Protection profile of an industrial firewall Version 1.0 mid-term GTCSI July 13, 2015 Preface In the whole document, the acronym ToE (Target of Evaluation) designates the component being evaluated. Text in red differs from the short-term version

More information

Chapter 15 Operating System Security

Chapter 15 Operating System Security Operating Systems: Internals and Design Principles Chapter 15 Operating System Security Eighth Edition By William Stallings System Access Threats System access threats fall into two general categories:

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

Security Implications Associated with Mass Notification Systems

Security Implications Associated with Mass Notification Systems Security Implications Associated with Mass Notification Systems Overview Cyber infrastructure: Includes electronic information and communications systems and services and the information contained in these

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester

More information

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc. Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter

More information

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Network Security. Network Security Hierarchy. CISCO Security Curriculum Network Security Network Security Hierarchy Material elaborat dupa: CISCO Security Curriculum Kenny Paterson s Lectures for: M.Sc. in Information Security, Royal Holloway, University of London 1 Objectives

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

FTA Computer Security Workshop. Secure Email

FTA Computer Security Workshop. Secure Email FTA Computer Security Workshop Secure Email March 8, 2007 Stan Wiechert, KDOR IS Security Officer Outline of Presentation The Risks associated with Email Business Constraints Secure Email Features Some

More information

Introduction...3. Conclusion...8. 2 White paper: IT SECURITY FOR SMART SCHOOLS

Introduction...3. Conclusion...8. 2 White paper: IT SECURITY FOR SMART SCHOOLS White Paper IT Security for Smart Schools msc trustgate.com (478231-X) (CA License No.: LK0022000) G / F, Belatuk Block, Cyberview Garden, 63000 Cyberjaya, Selangor Darul Ehsan, Malaysia. Tel: + 603 8318

More information

Austin Peay State University

Austin Peay State University 1 Austin Peay State University Identity Theft Operating Standards (APSUITOS) I. PROGRAM ADOPTION Austin Peay State University establishes Identity Theft Operating Standards pursuant to the Federal Trade

More information

Skoot Secure File Transfer

Skoot Secure File Transfer Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,

More information

Fundamentals of Network Security - Theory and Practice-

Fundamentals of Network Security - Theory and Practice- Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring

More information

Technical Information

Technical Information Technical Information Recorders, Data Loggers, and Control Products Security Standard Contents 1. Introduction... 1-1 Why Security Is Essential... 1-1 Applicable Products... 1-2 Trademarks... 1-2 2. Assets

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that

More information

Protection profile of an industrial firewall

Protection profile of an industrial firewall Version 1.0 short-term GTCSI July 13, 2015 Preface In the whole document, the acronym ToE (Target of Evaluation) designates the component being evaluated. Text in red differs from the mid-term version

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Intrusion Detection System (IDS)

Intrusion Detection System (IDS) Intrusion Detection System (IDS) Characteristics Systems User, Process predictable actions describing process under that actions what pattern subvert actions attack of correspond the systems processes

More information

QuickBooks Online: Security & Infrastructure

QuickBooks Online: Security & Infrastructure QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Introduction. -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services

Introduction. -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services Introduction -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services (c) Levente Buttyán (buttyan@crysys.hu) Attack, threat, and vulnerability security

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

Information System Security

Information System Security Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The

More information

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? (cont d) Firewall is a set of related programs, located at a network gateway server. Firewalls

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500 INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

CSC 474 Information Systems Security

CSC 474 Information Systems Security CSC 474 Information Systems Security Introduction About Instructor Dr. Peng Ning, assistant professor of computer science http://www.csc.ncsu.edu/faculty/ning pning@ncsu.edu (919)513-4457 Office: Room

More information

Secure Software Programming and Vulnerability Analysis

Secure Software Programming and Vulnerability Analysis Secure Software Programming and Vulnerability Analysis Christopher Kruegel chris@auto.tuwien.ac.at http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com Outline of Information Security Introduction Impact of information Need

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

Analysis of IP Spoofed DDoS Attack by Cryptography

Analysis of IP Spoofed DDoS Attack by Cryptography www..org 13 Analysis of IP Spoofed DDoS Attack by Cryptography Dalip Kumar Research Scholar, Deptt. of Computer Science Engineering, Institute of Engineering and Technology, Alwar, India. Abstract Today,

More information

Advanced Authentication

Advanced Authentication White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is

More information

Financial Institution Letters

Financial Institution Letters Financial Institution Letters Risk Assessment Tools And Practices For Information System Security FIL-68-99 July 7, 1999 TO: SUBJECT: CHIEF EXECUTIVE OFFICER FDIC Issues Paper on Information System Security

More information

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can BBM 461: SECURE PROGRAMMING INTRODUCTION 1 Ahmet Burak Can COURSE MATERIAL Counter Hack Reloaded:A Step-by- Step Guide to Computer Attacks and Effective Defenses, Edward Skoudis, Tom Liston, Prentice Hall

More information